General

  • Target

    2040-436-0x0000000000400000-0x000000000045E000-memory.dmp

  • Size

    376KB

  • MD5

    df057af60c92c2a5a004434270e16af7

  • SHA1

    0e019ad204dba091cba0170bf7cc4c0e686f7e5e

  • SHA256

    bac2d611a5514ab2ef11dc96cd6d2fc30ed5765322928088cb05b4a524b71e4e

  • SHA512

    40d95c9eb9b526422f17714370e6c95e939e3f9b71453f080e737111d5ceebd413b4729b7ac5e5e82081e19bfc77bef104bfc70522440ad62d93df2517e7ee56

  • SSDEEP

    6144:5YMZMB1rCw4ux4OqlARPhKhhrGiiMuowHWEXg/V6l0p:5YGMLdRPMfr4Mu32f/8q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1.0.1

C2

148.163.81.19:38619

Attributes
  • auth_value

    590d569fc729419091688ae460e2ae4d

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2040-436-0x0000000000400000-0x000000000045E000-memory.dmp
    .exe windows x86


    Headers

    Sections